HTTP: Elastic Kibana Timelion Prototype Pollution

This signature detects attempts to exploit a known vulnerability against Kibana. A successful attack can lead to Remote Code Execution.

Extended Description

Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.

Affected Products

Elastic kibana

Short Name
HTTP:CTS:KIBANA-TIMELION-CE
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2019-7609 Elastic Kibana Pollution Prototype Timelion
Release Date
12/18/2019
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3716
False Positive
Unknown
Vendors

Redhat

Elastic

CVSS Score

10.0

Found a potential security threat?